PinnedPublished inSystem WeaknessMobSF: An Automated Mobile Security FrameworkA penetration testing framework that performs static, dynamic, and malware analysis of mobile applications (Android/iOS/Windows) using an…Mar 19, 2022Mar 19, 2022
Phases of Penetration TestingA penetration tester simulates an adversary who is motivated to launch an attack. Following these steps usually results in what they do:Jun 11, 2022Jun 11, 2022
Penetration Testing & typesNow a day many websites are developed for different purposes and functionality. And it’s hard to give any proper statistics on the number…Jun 1, 2022Jun 1, 2022
Number Theory in CryptographyInsecurity applications like authentication, cryptography, etc number theory play a vital role. Cryptography is nowadays needed everywhere…Apr 9, 2022Apr 9, 2022
Published inBlockchain BizWhat are Zero-Knowledge Techniques and Zero-Knowledge Proofs (ZKPs)To preserve user privacy and guarantee data confidentiality on a network, it is crucial to secure communication between the mobile devices…Apr 2, 2022Apr 2, 2022
Published inSystem WeaknessWeb Application Testing with NMAP & OWASP ZAPOverviewMar 26, 2022Mar 26, 2022
DNSenum: A command-line Information Gathering ToolDNSenum is a command-line tool that automatically identifies essential DNS records such as MX, mail exchange servers, NS, domain name…Mar 12, 20221Mar 12, 20221
Published inSystem WeaknessGoogle Dork: An Information Gathering methodGoogle Dork queries, or just dorks, are searching strings that include advanced search operators to find information that may not be…Mar 5, 2022Mar 5, 2022